Loading...

Course Description

This course is part of the UBC Certificate in Cloud and Technology Transformation.

Leveraging the curriculum developed by EC-Council, the world’s largest cyber security technical certification body, this course provides insights into the current security scenario and increasing hacking attempts on various information systems. This rigorous course gives learners access to weekly live sessions with an instructor, EC-Council’s course materials, online labs, practice exam, and an exam voucher to take the certification exam to become a Certified Ethical Hacker.

In this course, learners will achieve a greater understanding of the ins and outs of ethical hacking, including footprinting and reconnaissance, scanning networks, vulnerability analysis and concepts around cryptography. Explore system hacking, malware threats, sniffing, social engineering, denial-of-service, session hijacking, evading IDS, firewalls and honeypots, and everything from hacking web servers, wireless networks and mobile platforms to SQL injection, IoT and OT hacking.

By the end of the course, you'll be able to:

  • Assess ethical and legal requirements of security assessment and penetration testing and determine a strategy to comply with these requirements.
  • Analyze different phases of hacking and recommend the strategy to use ethical hacking for assessing the security of various components of an information system.
  • Compare and contrast different hacking techniques and analyze the legal implications of hacking.
  • Examine different vulnerabilities, threats, and attacks to information systems and recommend the countermeasures.
  • Analyze cryptography algorithms and encryption techniques, and design implementation strategies for securing information.
  • Compare and contrast various network security assessment and hacking tools.
  • Assess various network security techniques and tools and implement the appropriate level of information security controls based on evidence, information, and research.

Course outline

This course is designed to provide you with an insight into the current security scenario and increasing hacking attempts on various information systems. The goal of ethical hacking and countermeasures is to help you and your organizations take preemptive measures against malicious attacks by attacking their own system while staying within legal limits.

Course topics:

  1. Introduction to Ethical Hacking
  2. Footprinting and Reconnaissance
  3. Scanning Network
  4. Enumeration
  5. Vulnerability Analysis
  6. System Hacking
  7. Malware Threats
  8. Sniffing
  9. Social Engineering
  10. Denial-of-Service
  11. Hijacking
  12. Evading, IDS, Firewalls, and Honeypots
  13. SQL Injection
  14. Hacking Wireless Networks
  15. Hacking Mobile Platforms
  16. IoT and OT Hacking
  17. Cloud Computing
  18. Cryptography 

How am I assessed?

You're assessed on successfully completing weekly activities, including your contributions to discussion posts and applied case study projects (based on real-life scenarios). Other assessments include assignments based on required readings, lab assignments, quizzes, research project, and a final exam. Your instructor provides you informal feedback in the live sessions as well as graded assignments.

While you're not assessed on your attendance of the live sessions, we encourage you to attend these classes, so you don't miss the opportunity to learn and interact with your instructor and other participants. All sessions are recorded in case you miss one.

Expected effort

Expect to spend approximately 5-7 hours per week completing all learning activities, including attending online live sessions.

Technology requirements

All course content is provided in the online courses. To take this program, you'll need access to:

  • an email account
  • a computer, laptop or tablet, using Windows or macOS
  • the latest version of a web browser (or previous major version release)
  • a reliable internet connection
  • a video camera and microphone

Course format

This part-time, 100% online course consists of self-paced content and weekly 1.5 hour virtual live sessions with a course instructor. These virtual sessions are also recorded for later viewing. Each week, learners will review readings, labs, and videos, and apply their knowledge in quizzes, exercises, research project and final exam. Students are expected to contribute to a discussion forum and participate in interactive activities with your peers and course instructor.

Course instructor

TRAVIS CZECH, is an instructor in cybersecurity, software development, ethical hacking and data engineering. In addition to teaching, he is a solutions and security architect and business and technology consultant. Travis is an EC-Council certified ethical hacker and network defender. His books include Cyber Security: Rust for Ethical Hacking, Cyber Security: Python for Penetration Testing and Cyber Security: Incident Response Plans.

Applies Towards the Following Certificates

Loading...
Enroll Now - Select a section to enroll in
Section Title
Ethical Hacking Certification Training
Type
Independent Study
Dates
Feb 11, 2025 to Jun 02, 2025
Delivery Options
Course Fee(s)
Standard Fee non-credit $3,200.00 Click here to get more information
Drop Request Deadline
Feb 06, 2025
Section Notes
Schedule Comments: This online course starts Tuesday, February 11 and ends June 2, 2025. The live, virtual classes are on Thursdays from 6:00pm to 8pm Pacific Time.
Section Title
Ethical Hacking Certification Training
Type
Independent Study
Dates
Oct 07, 2025 to Feb 09, 2026
Delivery Options
Course Fee(s)
Standard Fee non-credit $3,200.00 Click here to get more information
Drop Request Deadline
Sep 30, 2025
Section Notes
Schedule Comments: This online course starts Tuesday, October 7, 2025 and ends February 9, 2026. The live, virtual classes are on Thursdays from 6:00pm to 8pm Pacific Time.
Required fields are indicated by .